Is Technology Undermining Democracy?

Is technology undermining democracy? Do we ever really know how we arrive at our political views?

The pixelated vision of the near future offered in Jamie Bartlett’s new book would suggest that, as we continue to submerge into evermore complex and determinate technological systems, knowing the answer to such questions will become even more difficult.

As well as our concepts and theories, our democratic structures were, Bartlett points out, just not built for the types of technological shifts we are experiencing. Algorithms, cryptocurrency, data targeting, techno monopolies and the like, have changed the game. The result, he argues here, is that technology has now come to undermine a number of the ‘fundamental components of a functioning political system’. The tension between technology and democracy is reaching a new boiling point.

Where his previous book Radicals was about the extremes of politics, and how they sometimes worked their way into mainstream thought, this book by-passes the margins and deals directly with the center field. Following the recent debates around the use of social media data, it’s hard to imagine a timelier book. It zips along, covering the six pillars of democracy, as it is described, and imagining the tensions arising in each. Following a conclusion, the epilogue of the book moves from diagnosis to prescription, offering some potential ways of addressing the problems democracy faces.

The magnitude and severity of the challenges outlined in the earlier chapters mean that the solutions have quite a hill to climb.

The potential solutions are welcome and act as an antidote to the rising fear that the chapters provoke, yet despite their intended hopefulness they seem to underline the magnitude of the problems themselves. The suggestion around policing the algorithms seems to understate the problem and the suggestions around the taxation of robots seems unenforable. There remain though a number of ideas that seem to cut through; the ‘Universal Training Income’ is innovative, the focus on capital seems viable, and the more human and individual actions suggested are where the book offers its richest guide to the future.

In all of this Bartlett’s central concern is with growing inequality. By the end, you can see exactly why he is worried. The growing elite of techno capitalists are gaining unforeseen powers to determine online encounters and more. As Bartlett argues, when we consider these growing tech monopolies we should worry about the assumptions, ideas and futures upon which their victories are based. The destruction of jobs and of alternatives social structures leaves a field in which, as Bartlett notes, the few will achieve whatever they want and everyone else will be left to flounder. This power is couched in a more progressive type of rhetoric.

As Bartlett adds, ‘the worse these companies behave and the richer they become, the more they spend on looking cool and talking about fairness and community’.

This is why Bartlett turns to the classic concepts of hegemony and the panopticon in his book — they capture the advancing dominance of certain ideologies and the self-regulating surveillance that work in tandem in these power dynamics. Gramsci and Foucault don’t fully rear their heads, but there is enough to give some sense of the features that cut-across these platforms. Alongside this, the rise of what he calls ‘re-tribalistion’, where we are drawn towards those like us in online spaces, means that collective resistance to this power becomes difficult — we are too dispersed and distanced across these distributed networks.

Arriving at this volume, we could wonder what is really left to be said about technology and democracy.

The combination of the changing ways in which technology is being used to intervene in democracy, which has found a new purpose with the increases in data, and the way that Bartlett is able to navigate through some wide ranging terrain, mean that this book still brings a freshness of perspective.

Mixing together broader and sometimes familiar shifts in technologies with interviews and behind-the-curtain observations — made from visits to data campaign teams, silicon valley locations, venture capitalists and even Cambridge Analytica — the book offers plenty of moments of intrigue and insight.

The way Bartlett weaves blockchain into the discussion of political disruption, for example, is typical of the type of unusual perspective that the book brings.

From these provocations it becomes clear that there is still much more to be said about these long evolving relations. There is also a pressing need to reflect on the possible solutions.

The People Vs Tech by Jamie Bartlett (Ebury Press, Penguin ISBN: 978-1785039065)

David Beer is Reader in Sociology at the University of York

You Might Also Read:

The Cambridge Analytica Row Shows Politics Are Moving In A Disturbing Direction:

 

« Senior IT Execs Admit Cyber Threats Are Out Of Control
GDPR: It’s A Marathon, Not A Sprint »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Aristi Labs

Aristi Labs

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

DNSFilter

DNSFilter

DNSFilter is the most accurate threat detection and content filtering tool on the market today.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.